Port knocking with MikroTik

  Рет қаралды 16,388

MikroTik

MikroTik

Күн бұрын

Druvis will tell you how to listen to knocking.
Follow the config in our manual here: help.mikrotik.com/docs/displa...

Пікірлер: 42
@andreaoleari3606
@andreaoleari3606 2 ай бұрын
Very nice by You at Mikrotik! It opened up a really nice feature! Thanks!!!!
@nur76n
@nur76n Жыл бұрын
Also, you can use ICMP with custom packet size and you can ping (ping -l for Windows or ping -s for linux) from any OS without installing extra software. Packet size to ping should be packet size - 28 bytes (IP Header + ICMP Header).
@mvdswaluw
@mvdswaluw Жыл бұрын
The timeout isn't very clear in the firewall GUI (web and Winbox), by default you can just choose "non dynamic" or "non static". Because of this video I've learned that you can also use any times you like. Thanks.
@alimibrahem8120
@alimibrahem8120 Жыл бұрын
Very thanksful Eng Druvis..! 🌹🙏
@SiBex_ovh
@SiBex_ovh Жыл бұрын
Please do a new series of videos about vlans. Each episode should start of selecting devices to method, theory about that method, example configuration for Access/Tagged/Hybrid and Trunk - those on one device only, and how use those vlans on /ip/address to reach them, how use that method with bonding and Q&Q. I hope you can stop this series on 6 episodes bcs I know at least 6 way of creating vlans and each should be shorter then 1h. I hope you clear all stuff about VLAN on MikroTik by that videos, I wait for that video series. Remember, Hybrid port are for wifi AccessPoint very very important.
@Aviduduskar
@Aviduduskar 4 ай бұрын
Nice! Please consider adding Single Packet Authorization (fwknop) instead of the archaic port knocking method.
@mikkio5371
@mikkio5371 9 ай бұрын
Nice presentation. Thanks
@blindside995
@blindside995 Жыл бұрын
Love the video! Would love to see what you were talking about towards the end regarding a passphrase on top of this great trick! Love the contrast as always you all are incredible!
@mikrotik
@mikrotik Жыл бұрын
See link in description, it has that step
@blindside995
@blindside995 Жыл бұрын
When I try viewing that in your documentation it just reveals rand string of characters.
@NikolayUnguzov
@NikolayUnguzov Жыл бұрын
@@mikrotik I see only random string there - "VGhlbiBjcmVhdGUg....."
@blindside995
@blindside995 Жыл бұрын
Just going to leave this here if you google around a bit you'll find a slide show that has an example of how you do this. The key takeaways is that you create a layer 7 rule to match the passphrase along with the knocks. Then so long all matches you'll get in. Haven't added that part, but will be trying it later. I'll add another comment or edit my original with the syntax.
@blindside995
@blindside995 Жыл бұрын
@@xtlmeth mum.mikrotik.com/presentations/US10/discher.pdf
@drumaddict89
@drumaddict89 Жыл бұрын
did that some years ago. works pretty good btw. druvis seems to be quite a fast typer ;)
@mikkio5371
@mikkio5371 9 ай бұрын
He is your have to pay attention and flow in same frequency as his .
@thomasp.8327
@thomasp.8327 Жыл бұрын
Instead of configuring port ranges to secure the knocking you can use this line before to block port scanners add action=drop chain=input comment="dropping port scanners" in-interface-list=WAN src-address-list=\ "port scanners" add action=add-src-to-address-list address-list="port scanners" address-list-timeout=2w chain=input \ comment="Port scanners to list " in-interface-list=WAN log=yes log-prefix=scanner protocol=tcp \ psd=21,3s,3,1
@RB01-lite
@RB01-lite Жыл бұрын
Good point, but if you do it as in the video, it doesn't matter if someone is using cookie cutter scanning or if they are targeting specific ports.
@MustaMT
@MustaMT Жыл бұрын
Please do cover the passphrase thing in a coming video. Thank you :)
@me.ko.i1279
@me.ko.i1279 Жыл бұрын
Well... that looks like nice thing.
@Anavllama
@Anavllama Жыл бұрын
In general I fail to see the need for port knocking now that MT has wireguard built-in. Druvis, when is port knocking useful (better option than wireguard)???
@RB01-lite
@RB01-lite Жыл бұрын
Wireguard ports seem to be undetectable by port scan due to the use of UDP and PKI, but you might not always want to run everything through it. Or maybe you are restricted to using some weaker tunneling protocols - you could then hide those with port knocking.
@robsonlouzada-ativatecnolo2240
@robsonlouzada-ativatecnolo2240 Жыл бұрын
👏👏👏
@mykhal
@mykhal Жыл бұрын
Interesting. But you know what? Your (I suppose bash) `for` loop at 10:00 has in fact single item, which was interpreted as list in single `nmap` command.
@kchiem
@kchiem Жыл бұрын
Hey Druvis, the "low" part of "allow" is prounced like "loud" without the end "d" sound.
@Andrew_Thrift
@Andrew_Thrift Жыл бұрын
Knock, Knock, Who's there ? cAP ax
@mikrotik
@mikrotik Жыл бұрын
Actually it's Druvis
@ChrisNicholson
@ChrisNicholson Жыл бұрын
Why not put this in prerouting of mangle?
@Problembaer4
@Problembaer4 Жыл бұрын
I think you cannot allow acces to the router itself (input-chain) via magling.
@ChrisNicholson
@ChrisNicholson Жыл бұрын
@@Problembaer4 if you put those rules for black listing in prerouting... I assure you it will catch incoming connections. My f--koff list is generated there.
@Problembaer4
@Problembaer4 Жыл бұрын
@@ChrisNicholson then you need the define the DST-IP (the Router-IP itself) somehow. Via the input-chain, the routing-decision was already done. So yeah, I think both ways are possible but for most people the firewall is easier to understand as a "prerouting" chain.
@ChrisNicholson
@ChrisNicholson Жыл бұрын
@@Problembaer4 I use the wan interface.
@wreckedzilla
@wreckedzilla Жыл бұрын
knock knock, who's there? isis
@mr_jchristian
@mr_jchristian Жыл бұрын
666. Lol, Druvis.
@bossinthisgym
@bossinthisgym Жыл бұрын
Wrote this .bat script to protect my ports. Works only with windows: @echo off set target_ip=11.22.33.44 set /a PacketSize1=111 set /a PacketSize2=222 set /a PacketSize3=333 set ip=%target_ip% set /a size1=%PacketSize1%-28 set /a size2=%PacketSize2%-28 set /a size3=%PacketSize3%-28 set info=IP is: %ip%, ICMP size: %size1%, %size2%, %size3%; echo %info% CLS ping %ip% -l %size1% -n 2 CLS ping %ip% -l %size2% -n 2 CLS ping %ip% -l %size3% -n 2 CLS @echo off REM 2 sec hold ping -n 2 localhost>nul exit
@olegkn7769
@olegkn7769 6 ай бұрын
fool consol use
Graphing stuff with MikroTik
3:32
MikroTik
Рет қаралды 14 М.
Port Knocking в Mikrotik Firewall Filter
9:06
Mikrotik Training
Рет қаралды 10 М.
3 wheeler new bike fitting
00:19
Ruhul Shorts
Рет қаралды 52 МЛН
WHO DO I LOVE MOST?
00:22
dednahype
Рет қаралды 77 МЛН
Vivaan  Tanya once again pranked Papa 🤣😇🤣
00:10
seema lamba
Рет қаралды 25 МЛН
MikroTips: How to firewall
21:56
MikroTik
Рет қаралды 140 М.
Python SSH
13:09
MikroTik
Рет қаралды 13 М.
Port Knocking Attack | Ryan's CTF [17] Knock-Knock FINALE
20:56
John Hammond
Рет қаралды 17 М.
MikroTik CHR on Proxmox - How-To Guide
14:14
Admiral Platform (RemoteWinBox)
Рет қаралды 3,5 М.
Make your router run Scripts!
6:54
MikroTik
Рет қаралды 10 М.
MikroTik CRS305-1G-4S+IN 10G Switch Setup Review With VLANS
18:26
Lawrence Systems
Рет қаралды 162 М.
Port Knocking & Scanner Detection - Mikrotik Firewall Ep 3
18:02
Wilmer Almazan / The Network Trip
Рет қаралды 4,3 М.
How to port forward on MikroTik
10:21
MikroTik
Рет қаралды 86 М.
Dynamic Routing with Wireguard, Optimize your MikroTik network!
25:55
The Network Berg
Рет қаралды 18 М.
Firewall in RouterOS: Stopping a DDoS Attack
11:46
MikroTik Canada
Рет қаралды 21 М.
Simple maintenance. #leddisplay #ledscreen #ledwall #ledmodule #ledinstallation
0:19
LED Screen Factory-EagerLED
Рет қаралды 6 МЛН
Samsung S24 Ultra professional shooting kit #shorts
0:12
Photographer Army
Рет қаралды 35 МЛН
ПОКУПКА ТЕЛЕФОНА С АВИТО?🤭
1:00
Корнеич
Рет қаралды 3,3 МЛН
💅🏻Айфон vs Андроид🤮
0:20
Бутылочка
Рет қаралды 740 М.